Vous êtes sur la page 1sur 8

Do Your Projects With Domain Experts

LeMeniz Infotech
36, 100 feet Road, Natesan
Nagar(Near Indira Gandhi Statue, Next
to Fish-O-Fish), Pondicherry-605 005
Call: 0413-4205444, +91 99625 88976,
95663 55386.

DESIGNING

AN

EFFICIENT

IMAGE

ENCRYPTION-THEN-

COMPRESSION SYSTEM VIA PREDICTION ERROR CLUSTERING


AND RANDOM PERMUTATION

ABSTRACT
Image encryption has to be conducted prior to image compression in many
applications. This has led to the problem of how to design a pair of image
encryption and compression algorithms such that compressing the encrypted
images can still be efficiently performed. In this paper, we design a highly efficient
image encryption-then-compression (ETC) system, where both lossless and lossy
compression are considered. The proposed image encryption scheme operated in
the prediction error domain is shown to be able to provide a reasonably high level
of security. We also demonstrate that an arithmetic coding-based approach can be
exploited to efficiently compress the encrypted images. More notably, the
proposed compression approach applied to encrypted images is only slightly
worse, in terms of compression efficiency, than the state-of-the-art lossless/lossy
image coders, which take original, unencrypted images as inputs. In contrast, most
of the existing ETC solutions induce significant penalty on the compression
efficiency.

For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976


/9566355386

LeMeniz Infotech

Do Your Projects With Domain Experts

36, 100 feet Road, Natesan


Nagar(Near Indira Gandhi Statue, Next
to Fish-O-Fish), Pondicherry-605 005
Call: 0413-4205444, +91 99625 88976,
95663 55386.

INTRODUCTION
Consider an application scenario in which a content owner Alice wants to securely
and efficiently transmit an image I to a recipient Bob, via an untrusted channel
provider Charlie. Conventionally, this could be done as follows. Alice first
compresses I into B, and then encrypts B into Ie using an encryption function EK
(), where K denotes the secret key. The encrypted data Ie is then passed to
Charlie, who simply forwards it to Bob. Upon receiving Ie, Bob sequentially
performs decryption to get a reconstructed image I.

SCOPE OF WORK
Even

though

Compression-then-Encryption

(CTE)

paradigm

meets

the

requirements in many secure transmission scenarios, the order of applying the


compression and encryption needs to be reversed in some other situations. As the
content owner, is always interested in protecting the privacy of the image data
through encryption. Nevertheless, he has no incentive to compress her data, and
hence, will not use her limited computational resources to run a compression
algorithm before encrypting the data. This is especially true when content owner
uses a resource-deprived mobile device. In contrast, the channel provider has an
overriding interest in compressing all the network traffic so as to maximize the
network utilization. It is therefore much desired if the compression task can be

For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976


/9566355386

Do Your Projects With Domain Experts

LeMeniz Infotech
36, 100 feet Road, Natesan
Nagar(Near Indira Gandhi Statue, Next
to Fish-O-Fish), Pondicherry-605 005
Call: 0413-4205444, +91 99625 88976,
95663 55386.

delegated by channel provider, who typically has abundant computational


resources.
PROBLEM DEFINITION
A content owner wants to securely and efficiently transmit an image I to a
recipient, via an untrusted channel provider. Content owner first compresses the
image I, and then encrypts the image into Ie using an encryption function EK (),
where K denotes the secret key. The encrypted data Ie is then passed to content
receiver, who simply forwards through untrusted channel provider. After receiving
Ie, content sequentially performs decryption to get a reconstructed image. To
design a framework, which securely transfer the image via untrusted channel
provider is to be studied.

PROBLEM SOLUTION
The primary focus of this work is on the practical design of a pair of image
encryption and compression schemes, in such a way that compressing the
encrypted images is almost equally efficient as compressing their original,
unencrypted counterparts.

For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976


/9566355386

Do Your Projects With Domain Experts

LeMeniz Infotech
36, 100 feet Road, Natesan
Nagar(Near Indira Gandhi Statue, Next
to Fish-O-Fish), Pondicherry-605 005
Call: 0413-4205444, +91 99625 88976,
95663 55386.

CHALLENGES
A big challenge within such Encryption-then-Compression (ETC) framework is
that compression has to be conducted in the encrypted domain. The possibility of
processing encrypted signals directly in the encrypted domain has been receiving
increasing attention. At the first glance, it seems to be infeasible for channel
provider to compress the encrypted data, since no signal structure can be exploited
to enable a traditional compressor.
EXISTING SYSTEM
By applying LDPC codes in various bit-planes and exploiting the inter/intra
correlation, several methods available for lossless compression of encrypted
grayscale/color images.
Aided by rate-compatible punctured turbo codes a progressive method was
proposed to losslessly compress stream cipher encrypted grayscale/color
images.
Compressing block cipher encrypted data was studied, to achieve higher
compression ratios, lossy compression of encrypted data was also studied.
A scalable lossy coding framework of encrypted images via a multiresolution construction was proposed.
A compressive sensing (CS) mechanism was utilized to compress encrypted
images resulted from linear encryption. A modified basis pursuit algorithm
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976
/9566355386

Do Your Projects With Domain Experts

LeMeniz Infotech
36, 100 feet Road, Natesan
Nagar(Near Indira Gandhi Statue, Next
to Fish-O-Fish), Pondicherry-605 005
Call: 0413-4205444, +91 99625 88976,
95663 55386.

can then be applied to estimate the original image from the compressed and
encrypted data. Another CS-based approach for encrypting compressed
images was reported.
An image encryption scheme via pixel-domain permutation, and
demonstrated that the encrypted file can be efficiently compressed by
discarding the excessively rough and fine information of coefficients in the
transform domain.
Disadvantages
Even though the above Compression-then-Encryption (CTE) paradigm
meets the requirements in many secure transmission scenarios, the order of
applying the compression and encryption needs to be reversed in some other
situations.
PROPOSED SYSTEM

The primary focus of this work is on the practical design of a pair of image
encryption and compression schemes, in such a way that compressing the
encrypted images is almost equally efficient as compressing their original,
unencrypted counterparts.
To propose a permutation-based image encryption approach conducted over the
prediction error domain.
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976
/9566355386

LeMeniz Infotech

Do Your Projects With Domain Experts

36, 100 feet Road, Natesan


Nagar(Near Indira Gandhi Statue, Next
to Fish-O-Fish), Pondicherry-605 005
Call: 0413-4205444, +91 99625 88976,
95663 55386.

A context-adaptive arithmetic coding (AC) is then shown to be able to efficiently


compress the encrypted data.
Thanks to the nearly i.i.d property of the prediction error sequence, negligible
compression penalty (< 0.1% coding loss for lossless case) will be introduced.
Furthermore, due to the high sensitivity of prediction error sequence against
disturbances, reasonably high level of security could be retained.
Advantages
Reasonably high level of security needs is ensured.
HARDWARE REQUIREMENTS
Processor

: Any Processor above 500 MHz.

Ram

: 128Mb.

Hard Disk

: 10 Gb.

Compact Disk

: 650 Mb.

Input device

: Standard Keyboard and Mouse.

Output device

: VGA and High Resolution Monitor.

SOFTWARE SPECIFICATION
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976
/9566355386

LeMeniz Infotech

Do Your Projects With Domain Experts

36, 100 feet Road, Natesan


Nagar(Near Indira Gandhi Statue, Next
to Fish-O-Fish), Pondicherry-605 005
Call: 0413-4205444, +91 99625 88976,
95663 55386.

Operating System

: Windows Family.

Pages developed using : Java Swing


Techniques

: JDK 1.5 or higher

LITERATURE SUMMARY
Schonberg et. al later investigated the problem of compressing encrypted
images when the underlying source statistics is unknown and the sources
have memory.
By applying LDPC codes in various bit-planes and exploiting the inter/intra
correlation, Lazzeretti and Barni presented several methods for lossless
compression of encrypted grayscale/color images.
Kumar and Makur applied the approach to the prediction error domain and
achieved better lossless compression performance on the encrypted
grayscale/color images.
Aided by rate-compatible punctured turbo codes, Liu et. al developed a
progressive method to losslessly compress stream cipher encrypted
grayscale/color images.
Klinc et al. extended Johnsons framework to the case of compressing block
cipher encrypted data. To achieve higher compression ratios, lossy
compression of encrypted data was also studied.
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976
/9566355386

Do Your Projects With Domain Experts

LeMeniz Infotech
36, 100 feet Road, Natesan
Nagar(Near Indira Gandhi Statue, Next
to Fish-O-Fish), Pondicherry-605 005
Call: 0413-4205444, +91 99625 88976,
95663 55386.

Zhang et. Al proposed a scalable lossy coding framework of encrypted


images via a multi-resolution construction.
A compressive sensing (CS) mechanism was utilized to compress encrypted
images resulted from linear encryption. A modified basis pursuit algorithm
can then be applied to estimate the original image from the compressed and
encrypted data. Another CS-based approach for encrypting compressed
images was reported.
Zhang designed an image encryption scheme via pixel-domain permutation,
and demonstrated that the encrypted file can be efficiently compressed by
discarding the excessively rough and fine information of coefficients in the
transform domain.
Zhang et. al suggested a new compression approach for encrypted images
through multi-layer decomposition.
Extensions to blind compression of encrypted videos were developed.
Despite extensive efforts in recent years, the existing ETC systems still fall
significantly short in the compression performance, compared with the stateof-the-art lossless/lossy image compression performance on the encrypted
grayscale/color images.

For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976


/9566355386

Vous aimerez peut-être aussi